Cybersecurity Threats, Malware Trends, and Strategies
Tim Rains
Malware Data Science: Attack Detection and Attribution
Joshua Saxe & Hillary Sanders
Deep Learning Approaches to Text Production
Shashi Narayan and Claire Gardent
ChatGPT for Cybersecurity Cookbook
Clint Bodungen
Industrial Cybersecurity
Pascal Ackerman
Foundations of Information Security: A Straightforward Introduction
Jason Andress
Practical Binary Analysis: Build Your Own Linux Tools for Binary ...
Dennis Andriesse
Operating Systems
Remzi H. Arpaci-Dusseau & Andrea C. Arpaci-Dusseau
Serious Cryptography
Jean-Philippe Aumasson
Building Event-Driven Microservices
Adam Bellemare
Aligning Security Operations with the MITRE ATT&CK Framework
Rebecca Blair
Learn Wireshark - Fundamentals of Wireshark.
Lisa Bock
Computer Systems: A Programmer's Perspective
Randal E. Bryant & David R. O'Hallaron
Automating Security Detection Engineering
Dennis Chow
Software Architecture Metrics
Christian Ciceri & Dave Farley & Neal Ford & Andrew Harmel-Law & Michael Keeling & Carola Lilienthal & João Rosa & Alexander von Zitzewitz & Rene Weiß & and Eoin Woods
Mastering Cyber Intelligence
Jean Nestor M. Dahj
Ghidra Software Reverse Engineering for Beginners
A. P. David
The Book of R
Tilman M. Davies
Cybersecurity – Attack and Defense Strategies
Erdal Ozkaya Yuri Diogenes
CISA – Certified Information Systems Auditor Study Guide
Hemang Doshi
Hacking: The Art of Exploitation, 2nd Edition
Jon Erickson
The Shape of Data
Colleen M. Farrelly & Yaé Ulrich Gaba
Software Architecture: The Hard Parts
Neal Ford & Mark Richards & Pramod Sadalage & and Zhamak Dehghani
Attacking Network Protocols
James Forshaw
Computer Architecture
Charles Fox
Computer Graphics from Scratch: A Programmer’s Introduction ...
Gabriel Gambetta
Deep Learning
Andrew Glassner
Building Multi-Tenant SaaS Architectures
Tod Golding
Code Craft
Pete Goodliffe
Graph Representation Learning
William L. Hamilton
Serverless Development on AWS
Sheen Brisals and Luke Hedger
AWS Penetration Testing
Jonathan Helmus
Technology Strategy Patterns
Eben Hewitt
The Software Architect Elevator
Gregor Hohpe
Practical Malware Analysis: The Hands-On Guide to Dissecting ...
Michael Sikorski and Andrew Honig
The Hardware Hacker
Andrew “bunnie” Huang
The Book of I2C
Randall Hyde
Write Great Code, Volume 1: Understanding the Machine, 2nd Edition
Natural Language Processing for Social Media, Third Edition
Anna Atefeh Farzindar and Diana Inkpen
Mastering Azure Security
Mustafa Toroman and Tom Janetscheck
Digital Forensics and Incident Response
Gerard Johansen
Learn Kubernetes Security
Kaizhe Huang and Pranjal Jumde
How Computers Really Work: A Hands-On Guide to the Inner Workings ...
Matthew Justice
Mastering Malware Analysis
Amr Thabet Alexey Kleymenov
The Art of Randomness: Randomized Algorithms in the Real World
Ronald T. Kneusel
Practical Deep Learning: A Python-Based Introduction
Math for Deep Learning: What You Need to Know to Understand ...
The Complete Developer
Martin Krause
Data Structures the Fun Way: An Amusing Adventure with Coffee-Filled ...
Jeremy Kubica
Graph Algorithms the Fun Way
Computer Networking
James F. Kurose & Keith W. Ross
Creating Autonomous Vehicle Systems, Second Edition
Shaoshan Liu & Liyun Li & Jie Tang & Shuang Wu and Jean-Luc Gaudiot
Incident Response with Threat Intelligence
Roberto Martínez
Rootkits and Bootkits: Reversing Modern Malware and Next Generation ...
Alex Matrosov & Eugene Rodionov & Sergey Bratus
Dive into Systems: A Gentle Introduction to Computer Systems
Suzanne J. Matthews & Tia Newhall & Kevin C. Webb
The Foundations of Threat Hunting
Jeremy Thompson and William Copeland Chad Maurice
Web Security for Developers: Real Threats, Practical Defense
Malcolm McDonald
Building Micro-Frontends
Luca Mezzalira
Machine Learning Security Principles
John Paul Mueller
Microservices: Up and Running
Ronnie Mitra and Irakli Nadareishvili
CompTIA Security+: SY0-601 Certification Guide, Second Edition
Ian Neil